The Payment Process - University of California, San Diego



UCSD Credit Card Processing Policy & ProcedureThe Payment ProcessUCSD accepts Visa, MasterCard, American Express and Discover credit cards. We accept credit and debit transactions. Note: no debit sales with cash back.Verify that the signature on ID matches credit card, if cardholder’s name does not match name on identification do not accept card for payment, ask for another form of payment. Check the back of the credit card to see if it has been signed and is current. If it has not been signed, the cardholder must show you a current, valid, picture identification card (passport or driver’s license).If the customer is using a chip (EMV) card, there is no need for the cashier to check the card (or to identify the cardholder). Note: Merchants accepting EMV cards are protected against fraudulent transactions.Roles and ResponsibilitiesAll UCSD merchants:Front End Employees, Supervisors and Managers- All are allowed to process paymentsSupervisors and/or Managers-Approve and process refunds on terminalSensitive Authentication Data:There should not be any credit card information written down or processed at any location without assessment of PCI Administrator and proper process documentation. All paper with credit card information, arrived either by mail or telephone, should be properly destroyed with cross shredders. Credit card information should never be stored. Totally outsourced e-Commerce merchants should never process credit card at the merchant locations. Sensitive authentication data consists of full track data, card security codes, or values (CAV2, CID, CVC2, CVV2) and PIN data must not be stored after authorization, even if it is encrypted.No credit card information is to be sent via end-user message technologies (such as emails, text, etc.).ClientLine Reporting Access:Only supervisors and/or managers should have access to the Bank of America reporting tool – BusinessTrack (Formerly ClientLine) with credit card sales information. All users, regardless of roles, can only access masked Primary Account Numbers (PANs) on BusinessTrack with only the last four digits displayed.Maintaining Terminal InformationDepartment is to maintain an updated list of all terminal devices (ex: merchant ID, terminal ID, model of device) and list of authorized personnel who can process a credit card transaction at all time. Any changes to location of terminal, relocation, removing or adding, need to be approved Campus Credit Card Coordinator. No other devices are allowed to be used at any given time. Terminal is to be used for payments for [approved merchant] only. Use of this device for any other merchant activities, or non- UC Regents activities, is prohibited. Merchant is not allowed to change terminal ID, merchant ID, or any other terminal settings without approval of the General Accounting office. General Accounting will review documents on an annually basis. See “PCI DSS Req. 9.9 Equipment inspection” in the link below for more information. of TerminalThis section is to educate employees on what to look for and what to do if a terminal is tampered with.The department supervisor is required to check the terminal on a daily basis for evidence of tampering. A daily log of inspection completion is to be kept for auditing purposes. The terminals should be placed in an area where the public cannot access them without being noticed.Criminals use a technique called skimming to capture and transfer payment data to another source. By checking the terminal for any evidence of tampering minimizes the chances of credit card information being stolen. Always be cautious of unannounced service visits. Criminals can use this opportunity to gain access to a terminal and install a skimming device.Examples of tamperingCheck the terminal for any security stickers placed over screw holes or seams that will act as indicators of the case has been opened. Criminals often remove these labels when compromising terminals and may replace them with their own printed versions. Also, look for any signs that the label may have been removed or tampered with.Check for changes to terminal connections.Be aware of any additional, unfamiliar electronic equipment connected to the terminal.Examples of theft or loss of terminal to escalateIdentified terminal is missing.Your location was robbed and terminal is missing.Lost terminal during a relocation.Escalation process if you suspect tampering, theft or loss of terminal:Disconnect terminal and stop accepting credit card paymentsNotify your immediate supervisorContact the General Accounting OfficeContact PCI Administrator at acarlsson@ucsd.edu x20247 or knwong@ucsd.edu x42847Theft or Loss of TerminalIf you suspect individuals with suspicious behavior attempting to service terminal without Credit Card Coordinator and/or IT Security authorization, staff is to escalate as indicated in this policy.References:UCSD PCI-DSS Blink page Computer Incident Response Team (CIRT) Process Security Standards Council – Skimming Prevention: Overview of Best Practices for Merchants PCI Security Standards Council – Skimming Prevention: Best Practices for Merchants AcknowledgementI have read the SAQ B and Credit Card Processing Instructions and I recognize that I must maintain full PCI DSS compliance at all times.Signed name:Date: Printed name:Title: Merchant name:Merchant ID: ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download